xulrunner/xulrunner.changes
branchesr17
changeset 583 e1753761c9fd
parent 582 185659cb030f
child 584 0541c6b43891
--- a/xulrunner/xulrunner.changes	Wed Nov 21 11:38:37 2012 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,404 +0,0 @@
--------------------------------------------------------------------
-Wed Nov 21 10:37:50 UTC 2012 - wr@rosenauer.org
-
-- rebrand to xulrunner-esr
-
--------------------------------------------------------------------
-Tue Nov 20 20:15:23 UTC 2012 - wr@rosenauer.org
-
-- update to 17.0 (bnc#790140)
-  * MFSA 2012-91/CVE-2012-5842/CVE-2012-5843
-    Miscellaneous memory safety hazards
-  * MFSA 2012-92/CVE-2012-4202 (bmo#758200)
-    Buffer overflow while rendering GIF images
-  * MFSA 2012-93/CVE-2012-4201 (bmo#747607)
-    evalInSanbox location context incorrectly applied
-  * MFSA 2012-94/CVE-2012-5836 (bmo#792857)
-    Crash when combining SVG text on path with CSS
-  * MFSA 2012-95/CVE-2012-4203 (bmo#765628)
-    Javascript: URLs run in privileged context on New Tab page
-  * MFSA 2012-96/CVE-2012-4204 (bmo#778603)
-    Memory corruption in str_unescape
-  * MFSA 2012-97/CVE-2012-4205 (bmo#779821)
-    XMLHttpRequest inherits incorrect principal within sandbox
-  * MFSA 2012-99/CVE-2012-4208 (bmo#798264)
-    XrayWrappers exposes chrome-only properties when not in chrome
-    compartment
-  * MFSA 2012-100/CVE-2012-5841 (bmo#805807)
-    Improper security filtering for cross-origin wrappers
-  * MFSA 2012-101/CVE-2012-4207 (bmo#801681)
-    Improper character decoding in HZ-GB-2312 charset
-  * MFSA 2012-102/CVE-2012-5837 (bmo#800363)
-    Script entered into Developer Toolbar runs with chrome privileges
-  * MFSA 2012-103/CVE-2012-4209 (bmo#792405)
-    Frames can shadow top.location
-  * MFSA 2012-104/CVE-2012-4210 (bmo#796866)
-    CSS and HTML injection through Style Inspector
-  * MFSA 2012-105/CVE-2012-4214/CVE-2012-4215/CVE-2012-4216/
-    CVE-2012-5829/CVE-2012-5839/CVE-2012-5840/CVE-2012-4212/
-    CVE-2012-4213/CVE-2012-4217/CVE-2012-4218
-    Use-after-free and buffer overflow issues found using Address
-    Sanitizer
-  * MFSA 2012-106/CVE-2012-5830/CVE-2012-5833/CVE-2012-5835/CVE-2012-5838
-    Use-after-free, buffer overflow, and memory corruption issues
-    found using Address Sanitizer
-- rebased patches
-- disabled WebRTC since build is broken (bmo#776877)
-
--------------------------------------------------------------------
-Wed Oct 24 08:28:49 UTC 2012 - wr@rosenauer.org
-
-- update to 16.0.2 (bnc#786522)
-  * MFSA 2012-90/CVE-2012-4194/CVE-2012-4195/CVE-2012-4196
-    (bmo#800666, bmo#793121, bmo#802557)
-    Fixes for Location object issues
-
--------------------------------------------------------------------
-Thu Oct 11 01:50:19 UTC 2012 - wr@rosenauer.org
-
-- update to 16.0.1 (bnc#783533)
-  * MFSA 2012-88/CVE-2012-4191 (bmo#798045)
-    Miscellaneous memory safety hazards
-  * MFSA 2012-89/CVE-2012-4192/CVE-2012-4193 (bmo#799952, bmo#720619)
-    defaultValue security checks not applied
-
--------------------------------------------------------------------
-Sun Oct  7 21:41:01 UTC 2012 - wr@rosenauer.org
-
-- update to 16.0 (bnc#783533)
-  * MFSA 2012-74/CVE-2012-3982/CVE-2012-3983
-    Miscellaneous memory safety hazards
-  * MFSA 2012-75/CVE-2012-3984 (bmo#575294)
-    select element persistance allows for attacks
-  * MFSA 2012-76/CVE-2012-3985 (bmo#655649)
-    Continued access to initial origin after setting document.domain
-  * MFSA 2012-77/CVE-2012-3986 (bmo#775868)
-    Some DOMWindowUtils methods bypass security checks
-  * MFSA 2012-79/CVE-2012-3988 (bmo#725770)
-    DOS and crash with full screen and history navigation
-  * MFSA 2012-80/CVE-2012-3989 (bmo#783867)
-    Crash with invalid cast when using instanceof operator
-  * MFSA 2012-81/CVE-2012-3991 (bmo#783260)
-    GetProperty function can bypass security checks
-  * MFSA 2012-82/CVE-2012-3994 (bmo#765527)
-    top object and location property accessible by plugins
-  * MFSA 2012-83/CVE-2012-3993/CVE-2012-4184 (bmo#768101, bmo#780370)
-    Chrome Object Wrapper (COW) does not disallow acces to privileged
-    functions or properties
-  * MFSA 2012-84/CVE-2012-3992 (bmo#775009)
-    Spoofing and script injection through location.hash
-  * MFSA 2012-85/CVE-2012-3995/CVE-2012-4179/CVE-2012-4180/
-    CVE-2012-4181/CVE-2012-4182/CVE-2012-4183
-    Use-after-free, buffer overflow, and out of bounds read issues
-    found using Address Sanitizer
-  * MFSA 2012-86/CVE-2012-4185/CVE-2012-4186/CVE-2012-4187/
-    CVE-2012-4188
-    Heap memory corruption issues found using Address Sanitizer
-  * MFSA 2012-87/CVE-2012-3990 (bmo#787704)
-    Use-after-free in the IME State Manager
-- requires NSPR 4.9.2
-- removed upstreamed mozilla-crashreporter-restart-args.patch
-- updated translations-other with new languages
-
--------------------------------------------------------------------
-Sun Aug 26 13:48:04 UTC 2012 - wr@rosenauer.org
-
-- update to 15.0 (bnc#777588)
-  * MFSA 2012-57/CVE-2012-1970
-    Miscellaneous memory safety hazards
-  * MFSA 2012-58/CVE-2012-1972/CVE-2012-1973/CVE-2012-1974/CVE-2012-1975
-    CVE-2012-1976/CVE-2012-3956/CVE-2012-3957/CVE-2012-3958/CVE-2012-3959
-    CVE-2012-3960/CVE-2012-3961/CVE-2012-3962/CVE-2012-3963/CVE-2012-3964
-    Use-after-free issues found using Address Sanitizer
-  * MFSA 2012-59/CVE-2012-1956 (bmo#756719)
-    Location object can be shadowed using Object.defineProperty
-  * MFSA 2012-60/CVE-2012-3965 (bmo#769108)
-    Escalation of privilege through about:newtab
-  * MFSA 2012-61/CVE-2012-3966 (bmo#775794, bmo#775793)
-    Memory corruption with bitmap format images with negative height
-  * MFSA 2012-62/CVE-2012-3967/CVE-2012-3968
-    WebGL use-after-free and memory corruption
-  * MFSA 2012-63/CVE-2012-3969/CVE-2012-3970
-    SVG buffer overflow and use-after-free issues
-  * MFSA 2012-64/CVE-2012-3971
-    Graphite 2 memory corruption
-  * MFSA 2012-65/CVE-2012-3972 (bmo#746855)
-    Out-of-bounds read in format-number in XSLT
-  * MFSA 2012-66/CVE-2012-3973 (bmo#757128)
-    HTTPMonitor extension allows for remote debugging without explicit
-    activation
-  * MFSA 2012-68/CVE-2012-3975 (bmo#770684)
-    DOMParser loads linked resources in extensions when parsing
-    text/html
-  * MFSA 2012-69/CVE-2012-3976 (bmo#768568)
-    Incorrect site SSL certificate data display
-  * MFSA 2012-70/CVE-2012-3978 (bmo#770429)
-    Location object security checks bypassed by chrome code
-  * MFSA 2012-72/CVE-2012-3980 (bmo#771859)
-    Web console eval capable of executing chrome-privileged code
-- fix HTML5 video crash with GStreamer enabled (bmo#761030)
-- fixed filelist
-
--------------------------------------------------------------------
-Fri Aug 17 13:09:49 UTC 2012 - dmueller@suse.com
-
-- fix build on ARM:
-  * disable crashreporter, it does not build
-  * reduce debuginfo during built to avoid running out of memory
-
--------------------------------------------------------------------
-Sat Jul 14 19:33:44 UTC 2012 - wr@rosenauer.org
-
-- update to 14.0.1 (bnc#771583)
-  * MFSA 2012-42/CVE-2012-1949/CVE-2012-1948
-    Miscellaneous memory safety hazards
-  * MFSA 2012-43/CVE-2012-1950
-    Incorrect URL displayed in addressbar through drag and drop
-  * MFSA 2012-44/CVE-2012-1951/CVE-2012-1954/CVE-2012-1953/CVE-2012-1952
-    Gecko memory corruption
-  * MFSA 2012-45/CVE-2012-1955 (bmo#757376)
-    Spoofing issue with location
-  * MFSA 2012-46/CVE-2012-1966 (bmo#734076)
-    XSS through data: URLs
-  * MFSA 2012-47/CVE-2012-1957 (bmo#750096)
-    Improper filtering of javascript in HTML feed-view
-  * MFSA 2012-48/CVE-2012-1958 (bmo#750820)
-    use-after-free in nsGlobalWindow::PageHidden
-  * MFSA 2012-49/CVE-2012-1959 (bmo#754044, bmo#737559)
-    Same-compartment Security Wrappers can be bypassed
-  * MFSA 2012-50/CVE-2012-1960 (bmo#761014)
-    Out of bounds read in QCMS
-  * MFSA 2012-51/CVE-2012-1961 (bmo#761655)
-    X-Frame-Options header ignored when duplicated
-  * MFSA 2012-52/CVE-2012-1962 (bmo#764296)
-    JSDependentString::undepend string conversion results in memory
-    corruption
-  * MFSA 2012-53/CVE-2012-1963 (bmo#767778)
-    Content Security Policy 1.0 implementation errors cause data
-    leakage
-  * MFSA 2012-55/CVE-2012-1965 (bmo#758990)
-    feed: URLs with an innerURI inherit security context of page
-  * MFSA 2012-56/CVE-2012-1967 (bmo#758344)
-    Code execution through javascript: URLs
-- license change from tri license to MPL-2.0
-- require NSS 3.13.5
-- PPC fixes:
-  * reenabled mozilla-yarr-pcre.patch to fix build for PPC
-  * add patches for bmo#750620 and bmo#746112
-  * fix xpcshell segfault on ppc
-- build plugin-container on every arch
-
--------------------------------------------------------------------
-Fri Jun 15 12:40:23 UTC 2012 - wr@rosenauer.org
-
-- update to 13.0.1
-  * bugfix release
-
--------------------------------------------------------------------
-Sat Jun  2 09:16:34 UTC 2012 - wr@rosenauer.org
-
-- update to 13.0 (bnc#765204)
-  * MFSA 2012-34/CVE-2012-1938/CVE-2012-1937/CVE-2011-3101
-    Miscellaneous memory safety hazards
-  * MFSA 2012-36/CVE-2012-1944 (bmo#751422)
-    Content Security Policy inline-script bypass
-  * MFSA 2012-37/CVE-2012-1945 (bmo#670514)
-    Information disclosure though Windows file shares and shortcut
-    files
-  * MFSA 2012-38/CVE-2012-1946 (bmo#750109)
-    Use-after-free while replacing/inserting a node in a document
-  * MFSA 2012-40/CVE-2012-1947/CVE-2012-1940/CVE-2012-1941
-    Buffer overflow and use-after-free issues found using Address
-    Sanitizer
-- require NSS 3.13.4
-  * MFSA 2012-39/CVE-2012-0441 (bmo#715073)
-- reenabled crashreporter for Factory/12.2
-  (fixed in mozilla-gcc47.patch)
-
--------------------------------------------------------------------
-Sat Apr 21 10:03:42 UTC 2012 - wr@rosenauer.org
-
-- update to 12.0 (bnc#758408)
-  * rebased patches
-  * MFSA 2012-20/CVE-2012-0467/CVE-2012-0468
-    Miscellaneous memory safety hazards
-  * MFSA 2012-22/CVE-2012-0469 (bmo#738985)
-    use-after-free in IDBKeyRange
-  * MFSA 2012-23/CVE-2012-0470 (bmo#734288)
-    Invalid frees causes heap corruption in gfxImageSurface
-  * MFSA 2012-24/CVE-2012-0471 (bmo#715319)
-    Potential XSS via multibyte content processing errors
-  * MFSA 2012-25/CVE-2012-0472 (bmo#744480)
-    Potential memory corruption during font rendering using cairo-dwrite
-  * MFSA 2012-26/CVE-2012-0473 (bmo#743475)
-    WebGL.drawElements may read illegal video memory due to
-    FindMaxUshortElement error
-  * MFSA 2012-27/CVE-2012-0474 (bmo#687745, bmo#737307)
-    Page load short-circuit can lead to XSS
-  * MFSA 2012-28/CVE-2012-0475 (bmo#694576)
-    Ambiguous IPv6 in Origin headers may bypass webserver access
-    restrictions
-  * MFSA 2012-29/CVE-2012-0477 (bmo#718573)
-    Potential XSS through ISO-2022-KR/ISO-2022-CN decoding issues
-  * MFSA 2012-30/CVE-2012-0478 (bmo#727547)
-    Crash with WebGL content using textImage2D
-  * MFSA 2012-31/CVE-2011-3062 (bmo#739925)
-    Off-by-one error in OpenType Sanitizer
-  * MFSA 2012-32/CVE-2011-1187 (bmo#624621)
-    HTTP Redirections and remote content can be read by javascript errors
-  * MFSA 2012-33/CVE-2012-0479 (bmo#714631)
-    Potential site identity spoofing when loading RSS and Atom feeds
-- added mozilla-libnotify.patch to allow fallback from libnotify
-  to xul based events if no notification-daemon is running
-- gcc 4.7 fixes
-  * mozilla-gcc47.patch
-  * disabled crashreporter temporarily for Factory
-
--------------------------------------------------------------------
-Fri Mar  9 21:49:05 UTC 2012 - wr@rosenauer.org
-
-- update to version 11.0 (bnc#750044)
-  * MFSA 2012-13/CVE-2012-0455 (bmo#704354)
-    XSS with Drag and Drop and Javascript: URL
-  * MFSA 2012-14/CVE-2012-0456/CVE-2012-0457 (bmo#711653, #720103)
-    SVG issues found with Address Sanitizer
-  * MFSA 2012-15/CVE-2012-0451 (bmo#717511)
-    XSS with multiple Content Security Policy headers
-  * MFSA 2012-16/CVE-2012-0458
-    Escalation of privilege with Javascript: URL as home page
-  * MFSA 2012-17/CVE-2012-0459 (bmo#723446)
-    Crash when accessing keyframe cssText after dynamic modification
-  * MFSA 2012-18/CVE-2012-0460 (bmo#727303)
-    window.fullScreen writeable by untrusted content
-  * MFSA 2012-19/CVE-2012-0461/CVE-2012-0462/CVE-2012-0464/
-    CVE-2012-0463
-    Miscellaneous memory safety hazards
-- fix build on ARM
-- disable jemalloc on s390(x)
-
--------------------------------------------------------------------
-Thu Feb 16 08:51:42 UTC 2012 - wr@rosenauer.org
-
-- update to version 10.0.2 (bnc#747328)
-  * CVE-2011-3026 (bmo#727401)
-    libpng: integer overflow leading to heap-buffer overflow
-
--------------------------------------------------------------------
-Thu Feb  9 10:20:49 UTC 2012 - wr@rosenauer.org
-
-- update to version 10.0.1 (bnc#746616)
-  * MFSA 2012-10/CVE-2012-0452 (bmo#724284)
-    use after free in nsXBLDocumentInfo::ReadPrototypeBindings
-
--------------------------------------------------------------------
-Tue Feb  7 10:40:58 UTC 2012 - dvaleev@suse.com
-
-- Use YARR interpreter instead of PCRE on platforms where YARR JIT
-  is not supported, since PCRE doesnt build (bmo#691898)
-- fix ppc64 build (bmo#703534)
-
--------------------------------------------------------------------
-Mon Jan 30 09:43:21 UTC 2012 - wr@rosenauer.org
-
-- update to version 10.0 (bnc#744275)
-  * MFSA 2012-01/CVE-2012-0442/CVE-2012-0443
-    Miscellaneous memory safety hazards
-  * MFSA 2012-03/CVE-2012-0445 (bmo#701071)
-    <iframe> element exposed across domains via name attribute
-  * MFSA 2012-04/CVE-2011-3659 (bmo#708198)
-    Child nodes from nsDOMAttribute still accessible after removal
-    of nodes
-  * MFSA 2012-05/CVE-2012-0446 (bmo#705651)
-    Frame scripts calling into untrusted objects bypass security
-    checks
-  * MFSA 2012-06/CVE-2012-0447 (bmo#710079)
-    Uninitialized memory appended when encoding icon images may
-    cause information disclosure
-  * MFSA 2012-07/CVE-2012-0444 (bmo#719612)
-    Potential Memory Corruption When Decoding Ogg Vorbis files
-  * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466)
-    Crash with malformed embedded XSLT stylesheets
-- removed obsolete ppc64 patch
-- disable neon for ARM as it doesn't build correctly
-
--------------------------------------------------------------------
-Fri Dec 23 17:02:01 UTC 2011 - wr@rosenauer.org
-
-- update to Firefox 9.0.1
-  * (strongparent) parentNode of element gets lost (bmo#335998)
-
--------------------------------------------------------------------
-Sun Dec 18 09:28:02 UTC 2011 - wr@rosenauer.org
-
-- update to release 9.0 (bnc#737533)
-  * MFSA 2011-53/CVE-2011-3660
-    Miscellaneous memory safety hazards (rv:9.0)
-  * MFSA 2011-54/CVE-2011-3661 (bmo#691299)
-    Potentially exploitable crash in the YARR regular expression
-    library
-  * MFSA 2011-55/CVE-2011-3658 (bmo#708186)
-    nsSVGValue out-of-bounds access
-  * MFSA 2011-56/CVE-2011-3663 (bmo#704482)
-    Key detection without JavaScript via SVG animation
-  * MFSA 2011-58/VE-2011-3665 (bmo#701259)
-    Crash scaling <video> to extreme sizes
-
--------------------------------------------------------------------
-Sat Nov 12 15:20:49 UTC 2011 - wr@rosenauer.org
-
-- fix ppc64 build
-
--------------------------------------------------------------------
-Sun Nov  6 08:23:04 UTC 2011 - wr@rosenauer.org
-
-- update to release 8.0 (bnc#728520)
-  * MFSA 2011-47/CVE-2011-3648 (bmo#690225)
-    Potential XSS against sites using Shift-JIS
-  * MFSA 2011-48/CVE-2011-3651/CVE-2011-3652/CVE-2011-3654
-    Miscellaneous memory safety hazards
-  * MFSA 2011-49/CVE-2011-3650 (bmo#674776)
-    Memory corruption while profiling using Firebug
-  * MFSA 2011-52/CVE-2011-3655 (bmo#672182)
-    Code execution via NoWaiverWrapper
-- rebased patches
-
--------------------------------------------------------------------
-Fri Sep 30 10:59:54 UTC 2011 - wr@rosenauer.org
-
-- update to minor release 7.0.1
-  * fixed staged addon updates
-
--------------------------------------------------------------------
-Fri Sep 23 11:36:04 UTC 2011 - wr@rosenauer.org
-
-- update to version 7.0 (bnc#720264)
-  * MFSA 2011-36/CVE-2011-2995/CVE-2011-2996/CVE-2011-2997
-    Miscellaneous memory safety hazards
-  * MFSA 2011-39/CVE-2011-3000 (bmo#655389)
-    Defense against multiple Location headers due to CRLF Injection
-  * MFSA 2011-40/CVE-2011-2372/CVE-2011-3001
-    Code installation through holding down Enter
-  * MFSA 2011-41/CVE-2011-3002/CVE-2011-3003 (bmo#680840, bmo#682335)
-    Potentially exploitable WebGL crashes
-  * MFSA 2011-42/CVE-2011-3232 (bmo#653672)
-    Potentially exploitable crash in the YARR regular expression
-    library
-  * MFSA 2011-43/CVE-2011-3004 (bmo#653926)
-    loadSubScript unwraps XPCNativeWrapper scope parameter
-  * MFSA 2011-44/CVE-2011-3005 (bmo#675747)
-    Use after free reading OGG headers
-  * MFSA 2011-45
-    Inferring keystrokes from motion data
-- removed obsolete mozilla-cairo-lcd.patch
-- rebased patches
-
--------------------------------------------------------------------
-Tue Sep 20 11:54:28 UTC 2011 - wr@rosenauer.org
-
-- install xpt.py into SDK (mozilla-639554.patch) (bnc#639554)
-
--------------------------------------------------------------------
-Wed Sep 14 13:07:39 UTC 2011 - wr@rosenauer.org
-
-- initial xulrunner package
-